[/.] A Look At the CoreFlood Botnet

A Look At the CoreFlood Botnet

CNet is running a story about research from security expert Joe Stewart into the CoreFlood botnet, which has harvested at least “50 gigabytes of compressed data, searchable in a MySQL database,” from a group of over 370,000 bot IDs. Stewart explains how the botnet operates and some of the things he’s learned about the group that operates it. "Within the 50GB file, Stewart was able to discern how the thieves culled the data. He said they run a test script against that data that will log via a proxy into the bank using the credentials captured, say by a keylogging application. The CoreFlood script will then capture the HTML data on the post long-in page. In most cases, that page also contains the account’s bank balance. They do that, he said, so that after running the test they have a picture of what are the highest dollar amounts. ‘I don’t know whether they steal from all of them. We don’t have access to the accounts; the bank is not going to tell us how much was stolen out of any given account. We’re not going to get that information, but we know they’re actively logging and checking accounts to collect the balance data. The only reason (the script) can see that data is to target the biggest accounts first,’ he said."Read more of this story at Slashdot.